Each and every piece of information shared with us is valuable, and we have incredibly stringent policies to ensure that data security is never compromised. We have been greatly successful in building the reputation of being the most reliable and trustworthy service provider owing to our data security and confidentiality policies. Our recurring client base is a testimony to justify our claims.
Data Security & Confidentiality:
For 100% data security and confidentiality, we have established stringent protocols to cover the physical as well as IT-related aspects of data security:
Physical Security
- The physical security protocols take complete care of data security and data safety at our location.
- We are equipped with closed-circuit cameras on our premises to monitor and ensure safety. We permit controlled entry to our production areas with our access control system at the entry point of our workplace.
- Our cloud server or server room has restricted access, which is authenticated by an access card. Only the IT team has access to the server room.
- None of our workstations have CD R/W drives.
- The USB ports of our workstations are also disabled.
- Confidential materials, as well as documents, are stored securely, and complete protection is ensured.
IT Security
- All our workstations have the latest anti-virus software which does a quick scan every day. We also have scheduled boot scans and full scans to ensure complete data security.
- Additionally, we also have anti-malware software in all our computers to scan the system twice a day.
- We also have strong firewalls in place to ensure the complete security of our IT network.
- We continuously review and regulate account access requirements. We also practice deactivating accounts after separation of affiliation.
- All workstations and servers have session controls for additional security. The session time-out time for all computers is 10 minutes and for servers, it is 5 minutes, respectively. Once locked, the system requires re-authentication to unlock.
- We have effective backup operations like daily backups, differential backups, and full backups scheduled to avoid data loss.
- Users are not permitted to access personal email accounts on company accounts and vice versa.
- We follow a paperless environment which ensures data security as well as helps us in being eco-friendly.
- Outsider access is effectively prevented using IP authentication.
Confidentiality
- We have the policy to obtain signed non-disclosure and non-compete agreement from every employee at the time of hiring.
- As per this agreement, no employee is permitted to share any information regarding the client with any third party without the client’s consent.